General

  • Target

    57dd974e400ea936f5d4e3260f792428_JaffaCakes118

  • Size

    787KB

  • Sample

    241018-rggflstcjm

  • MD5

    57dd974e400ea936f5d4e3260f792428

  • SHA1

    6f4e6bc982131cd5f1d4b8ca0934246a6ed649ff

  • SHA256

    5cbdc05183fb0ce11248ead0c4a5de031cc724171360b38214a4b3facf58ce7d

  • SHA512

    8d660ec13154f97ae0982ef967b7bb07c8821a4190fe17b44cb4175cccb20e670a488e0898ac01bf182c2732f59793e5cf12158b01f5d03f3c5621f0b5468ebf

  • SSDEEP

    12288:rQcWdPs+6veQlqhFWEp7knFBIufsez6GAKIeZU8OKgwtUZc57io7snc:rQ1P3Aqxp70Btz60IGU8OHwmc9io7j

Malware Config

Targets

    • Target

      57dd974e400ea936f5d4e3260f792428_JaffaCakes118

    • Size

      787KB

    • MD5

      57dd974e400ea936f5d4e3260f792428

    • SHA1

      6f4e6bc982131cd5f1d4b8ca0934246a6ed649ff

    • SHA256

      5cbdc05183fb0ce11248ead0c4a5de031cc724171360b38214a4b3facf58ce7d

    • SHA512

      8d660ec13154f97ae0982ef967b7bb07c8821a4190fe17b44cb4175cccb20e670a488e0898ac01bf182c2732f59793e5cf12158b01f5d03f3c5621f0b5468ebf

    • SSDEEP

      12288:rQcWdPs+6veQlqhFWEp7knFBIufsez6GAKIeZU8OKgwtUZc57io7snc:rQ1P3Aqxp70Btz60IGU8OHwmc9io7j

    Score
    7/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks